mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-05-08 10:08:47 +00:00
Add bl2 setup code common across Broadcom platforms
Signed-off-by: Sheetal Tigadoli <sheetal.tigadoli@broadcom.com> Change-Id: Iabeaee35c22608c93945c8295bf70947b0f6049a
This commit is contained in:
parent
5c38088881
commit
717448d622
26 changed files with 2966 additions and 0 deletions
202
plat/brcm/common/brcm_bl2_setup.c
Normal file
202
plat/brcm/common/brcm_bl2_setup.c
Normal file
|
@ -0,0 +1,202 @@
|
|||
/*
|
||||
* Copyright (c) 2019-2020, ARM Limited and Contributors. All rights reserved.
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-3-Clause
|
||||
*/
|
||||
|
||||
#include <assert.h>
|
||||
#include <string.h>
|
||||
|
||||
#include <arch_helpers.h>
|
||||
#include <common/bl_common.h>
|
||||
#include <common/debug.h>
|
||||
#include <common/desc_image_load.h>
|
||||
#include <drivers/arm/sp804_delay_timer.h>
|
||||
#include <lib/mmio.h>
|
||||
|
||||
#include <bcm_console.h>
|
||||
#include <platform_def.h>
|
||||
#include <plat/brcm/common/plat_brcm.h>
|
||||
|
||||
/* Data structure which holds the extents of the trusted SRAM for BL2 */
|
||||
static meminfo_t bl2_tzram_layout __aligned(CACHE_WRITEBACK_GRANULE);
|
||||
|
||||
/* Weak definitions may be overridden in specific BRCM platform */
|
||||
#pragma weak plat_bcm_bl2_platform_setup
|
||||
#pragma weak plat_bcm_bl2_plat_arch_setup
|
||||
#pragma weak plat_bcm_security_setup
|
||||
#pragma weak plat_bcm_bl2_plat_handle_scp_bl2
|
||||
#pragma weak plat_bcm_bl2_early_platform_setup
|
||||
|
||||
void plat_bcm_bl2_early_platform_setup(void)
|
||||
{
|
||||
}
|
||||
|
||||
void plat_bcm_bl2_platform_setup(void)
|
||||
{
|
||||
}
|
||||
|
||||
void plat_bcm_bl2_plat_arch_setup(void)
|
||||
{
|
||||
}
|
||||
|
||||
void plat_bcm_security_setup(void)
|
||||
{
|
||||
}
|
||||
|
||||
void bcm_bl2_early_platform_setup(uintptr_t tb_fw_config,
|
||||
meminfo_t *mem_layout)
|
||||
{
|
||||
/* Initialize the console to provide early debug support */
|
||||
bcm_console_boot_init();
|
||||
|
||||
/* Setup the BL2 memory layout */
|
||||
bl2_tzram_layout = *mem_layout;
|
||||
|
||||
/* Initialise the IO layer and register platform IO devices */
|
||||
plat_brcm_io_setup();
|
||||
|
||||
/* Log HW reset event */
|
||||
INFO("RESET: 0x%x\n",
|
||||
mmio_read_32(CRMU_RESET_EVENT_LOG));
|
||||
}
|
||||
|
||||
void bl2_early_platform_setup2(u_register_t arg0, u_register_t arg1,
|
||||
u_register_t arg2, u_register_t arg3)
|
||||
{
|
||||
/* SoC specific setup */
|
||||
plat_bcm_bl2_early_platform_setup();
|
||||
|
||||
/* Initialize delay timer driver using SP804 dual timer 0 */
|
||||
sp804_timer_init(SP804_TIMER0_BASE,
|
||||
SP804_TIMER0_CLKMULT, SP804_TIMER0_CLKDIV);
|
||||
|
||||
/* BRCM platforms generic setup */
|
||||
bcm_bl2_early_platform_setup((uintptr_t)arg0, (meminfo_t *)arg1);
|
||||
}
|
||||
|
||||
/*
|
||||
* Perform Broadcom platform setup.
|
||||
*/
|
||||
void bcm_bl2_platform_setup(void)
|
||||
{
|
||||
/* Initialize the secure environment */
|
||||
plat_bcm_security_setup();
|
||||
}
|
||||
|
||||
void bl2_platform_setup(void)
|
||||
{
|
||||
bcm_bl2_platform_setup();
|
||||
plat_bcm_bl2_platform_setup();
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* Perform the very early platform specific architectural setup here. At the
|
||||
* moment this is only initializes the mmu in a quick and dirty way.
|
||||
******************************************************************************/
|
||||
void bcm_bl2_plat_arch_setup(void)
|
||||
{
|
||||
#ifndef MMU_DISABLED
|
||||
if (!(read_sctlr_el1() & SCTLR_M_BIT)) {
|
||||
const mmap_region_t bl_regions[] = {
|
||||
MAP_REGION_FLAT(bl2_tzram_layout.total_base,
|
||||
bl2_tzram_layout.total_size,
|
||||
MT_MEMORY | MT_RW | MT_SECURE),
|
||||
MAP_REGION_FLAT(BL_CODE_BASE,
|
||||
BL_CODE_END - BL_CODE_BASE,
|
||||
MT_CODE | MT_SECURE),
|
||||
MAP_REGION_FLAT(BL_RO_DATA_BASE,
|
||||
BL_RO_DATA_END - BL_RO_DATA_BASE,
|
||||
MT_RO_DATA | MT_SECURE),
|
||||
#if USE_COHERENT_MEM
|
||||
MAP_REGION_FLAT(BL_COHERENT_RAM_BASE,
|
||||
BL_COHERENT_RAM_END -
|
||||
BL_COHERENT_RAM_BASE,
|
||||
MT_DEVICE | MT_RW | MT_SECURE),
|
||||
#endif
|
||||
{0}
|
||||
};
|
||||
|
||||
setup_page_tables(bl_regions, plat_brcm_get_mmap());
|
||||
enable_mmu_el1(0);
|
||||
}
|
||||
#endif
|
||||
}
|
||||
|
||||
void bl2_plat_arch_setup(void)
|
||||
{
|
||||
#ifdef ENA_MMU_BEFORE_DDR_INIT
|
||||
/*
|
||||
* Once MMU is enabled before DDR, MEMORY TESTS
|
||||
* get affected as read/write transaction might occures from
|
||||
* caches. So For running memory test, one should not set this
|
||||
* flag.
|
||||
*/
|
||||
bcm_bl2_plat_arch_setup();
|
||||
plat_bcm_bl2_plat_arch_setup();
|
||||
#else
|
||||
plat_bcm_bl2_plat_arch_setup();
|
||||
bcm_bl2_plat_arch_setup();
|
||||
#endif
|
||||
}
|
||||
|
||||
int bcm_bl2_handle_post_image_load(unsigned int image_id)
|
||||
{
|
||||
int err = 0;
|
||||
|
||||
bl_mem_params_node_t *bl_mem_params = get_bl_mem_params_node(image_id);
|
||||
|
||||
assert(bl_mem_params);
|
||||
|
||||
switch (image_id) {
|
||||
case BL32_IMAGE_ID:
|
||||
bl_mem_params->ep_info.spsr = brcm_get_spsr_for_bl32_entry();
|
||||
break;
|
||||
|
||||
case BL33_IMAGE_ID:
|
||||
/* BL33 expects to receive the primary CPU MPID (through r0) */
|
||||
bl_mem_params->ep_info.args.arg0 = 0xffff & read_mpidr();
|
||||
bl_mem_params->ep_info.spsr = brcm_get_spsr_for_bl33_entry();
|
||||
break;
|
||||
|
||||
#ifdef SCP_BL2_BASE
|
||||
case SCP_BL2_IMAGE_ID:
|
||||
/* The subsequent handling of SCP_BL2 is platform specific */
|
||||
err = bcm_bl2_handle_scp_bl2(&bl_mem_params->image_info);
|
||||
if (err)
|
||||
WARN("Failure in platform-specific handling of SCP_BL2 image.\n");
|
||||
break;
|
||||
#endif
|
||||
default:
|
||||
/* Do nothing in default case */
|
||||
break;
|
||||
}
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
/*******************************************************************************
|
||||
* This function can be used by the platforms to update/use image
|
||||
* information for given `image_id`.
|
||||
******************************************************************************/
|
||||
int bcm_bl2_plat_handle_post_image_load(unsigned int image_id)
|
||||
{
|
||||
return bcm_bl2_handle_post_image_load(image_id);
|
||||
}
|
||||
|
||||
int bl2_plat_handle_post_image_load(unsigned int image_id)
|
||||
{
|
||||
return bcm_bl2_plat_handle_post_image_load(image_id);
|
||||
}
|
||||
|
||||
#ifdef SCP_BL2_BASE
|
||||
int plat_bcm_bl2_plat_handle_scp_bl2(image_info_t *scp_bl2_image_info)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
int bcm_bl2_handle_scp_bl2(image_info_t *scp_bl2_image_info)
|
||||
{
|
||||
return plat_bcm_bl2_plat_handle_scp_bl2(scp_bl2_image_info);
|
||||
}
|
||||
#endif
|
Loading…
Add table
Add a link
Reference in a new issue